Hacksplaining
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance
Sign Up
Log In
FeaturesLessonsEnterpriseThe BookOWASP Top 10PCI Compliance Sign Up Log In

Information Leakage

Attackers sometimes deploy complex "finger-printing" tools to determine server type. By submitting non-standard HTTP requests (like DELETE requests) and broken HTTP headers, they can heuristically determine the likely server type by examining how it responds in these ambiguous situations.

NMAP fingerprinting
Lessons
Glossary
Terms and Conditions
Privacy Policy

© 2026 Hacksplaining Inc. All rights reserved. Questions? Email us at support@hacksplaining.com